Skip to main content
Share
Favorite

315
RESULTS

movies 158
texts 154
audio 1
data 1
software 1
COLLECTION
TOPIC
debugging 172
OpenSecurityTraining.info 147
Computer Security 111
Computer security class 111
Cyber Security 111
Host Security 111
IA32 96
Intel x86 96
security 87
Intel 86
x86 86
EAT 74
IAT 74
IAT hooking 74
PE 74
PE/COFF 74
WinDbg 74
Windows PE 74
Windows executable 74
binaries 74
binary executable format 74
program 74
x86 assembly 74
Debugging 65
ASLR 63
DEP 63
SEH 63
TLS 63
UPX 63
abstract assembly tree 63
abstract syntax tree 63
compiling 63
computer virus 63
concrete syntax tree 63
context free grammars 63
lexing 63
linking 63
packers 63
parse tree 63
parsing 63
tokenizing 63
Classes 60
Computer 60
Computers 60
CyberSecurity 60
Disassembly 60
Education 60
IDA 60
IDA Pro 60
Multi-day-class 60
Multi-day-training 60
Reverse Engineering 60
Security 60
Technology 60
Training 60
debugger 58
ELF 51
ELF binary format 51
Executable and Linkable Format 51
Portable Executable 51
computer 41
command 39
classes 36
computer security 36
computer security class 36
computers 36
cyber security 36
education 36
file 36
host security 36
multi-day-class 36
multi-day-training 36
training 36
malware 35
Malware 26
Malware Analysis 26
Static Analysis 26
memory 26
reverse engineering 25
rootkits 24
Export Address Table 23
Import Address Table 23
Import Address Table hooking 23
Portable Executable format 23
binary format 23
exports 23
forwarded exports 23
imports 23
code 22
trace 21
user 21
data 20
dialog box 19
dialog 18
system 18
compiler 17
debugging programs 16
target system 16
chapter 15
command file 15
file command 15
program execution 15
source 15
window commands 15
window 14
disassembly 13
interrupts 13
memory management 13
paging 13
port IO 13
segmentation 13
Address Space Layout Randomization 12
DOS Header 12
File Header 12
Optional Header 12
Section Header 12
Structured Exception Handlers 12
Structured Exception Handling 12
Thread Local Storage 12
bound imports 12
compilation 12
computer viruses 12
data execution prevention 12
delayed imports 12
import by name 12
import by ordinal 12
linker 12
load configuration 12
packing 12
relocatable code 12
relocations 12
resources 12
runtime imports 12
signed code 12
DKOM 11
Direct Kernel Object Manipulation 11
GMER 11
IDT 11
IDT hooking 11
IO Request Packets 11
IRP hooking 11
IRPs 11
Interrupt Descriptor Table 11
KOH 11
Kernel Object Hooking 11
MBR rootkit 11
Master Boot Record 11
SSDT 11
SSDT hooking 11
System Service Descriptor Table 11
Tuluka 11
VirusBlokAda 11
Volatility 11
Windows rootkits 11
artificial intelligence 11
bootkit 11
hooking 11
hooks 11
inline hooking 11
inline hooks 11
malware detection 11
memory forensics 11
rootkit 11
rootkit detection 11
rootkit detector 11
stealth malware 11
address 10
breakpoint 10
fortran 10
menu barcommands 10
physical memory 10
software 10
source code 10
user program 10
virtual memory 10
debug 9
emulator 9
window control 9
debugging system 8
digital 8
problem solving 8
commands 7
debugging tools 7
error 7
function 7
functions 7
programming 7
statement 7
symbol 7
symbol table 7
test 7
array 6
bell system 6
cobol 6
execution 6
foreground monitor 6
operating system 6
system technical 6
testing 6
turbo 6
CREATOR
SHOW DETAILS